{"id":"UBUNTU-CVE-2024-35176","details":"REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `\u003c`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.","modified":"2026-02-04T02:52:13.362387Z","published":"2024-05-16T16:15:00Z","related":["USN-7091-1","USN-7091-2","USN-7418-1","USN-7734-1","USN-7840-1"],"upstream":["CVE-2024-35176"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35176"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2024-35176"},{"type":"REPORT","url":"https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7091-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7091-2"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7418-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7734-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7840-1"}],"affected":[{"package":{"name":"jruby","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/jruby@1.5.6-9+deb8u2build0.14.04.1~esm2?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.5.6-5ubuntu1","1.5.6-6","1.5.6-7","1.5.6-9+deb8u2build0.14.04.1~esm2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.5.6-9+deb8u2build0.14.04.1~esm2","binary_name":"jruby"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"ruby2.3","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ruby2.3@2.3.1-2~ubuntu16.04.16+esm11?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.1-2~ubuntu16.04.16+esm11"}]}],"versions":["2.3.0-1","2.3.0-2","2.3.0-4ubuntu2","2.3.0-4ubuntu3","2.3.0-5ubuntu1","2.3.1-2~16.04","2.3.1-2~16.04.2","2.3.1-2~16.04.4","2.3.1-2~16.04.5","2.3.1-2~16.04.6","2.3.1-2~16.04.7","2.3.1-2~16.04.9","2.3.1-2~16.04.10","2.3.1-2~16.04.11","2.3.1-2~16.04.12","2.3.1-2~ubuntu16.04.13","2.3.1-2~ubuntu16.04.14","2.3.1-2~ubuntu16.04.15","2.3.1-2~ubuntu16.04.16","2.3.1-2~ubuntu16.04.16+esm1","2.3.1-2~ubuntu16.04.16+esm2","2.3.1-2~ubuntu16.04.16+esm3","2.3.1-2~ubuntu16.04.16+esm4","2.3.1-2~ubuntu16.04.16+esm5","2.3.1-2~ubuntu16.04.16+esm6","2.3.1-2~ubuntu16.04.16+esm7","2.3.1-2~ubuntu16.04.16+esm8","2.3.1-2~ubuntu16.04.16+esm9","2.3.1-2~ubuntu16.04.16+esm10"],"ecosystem_specific":{"binaries":[{"binary_version":"2.3.1-2~ubuntu16.04.16+esm11","binary_name":"libruby2.3"},{"binary_version":"2.3.1-2~ubuntu16.04.16+esm11","binary_name":"ruby2.3"},{"binary_version":"2.3.1-2~ubuntu16.04.16+esm11","binary_name":"ruby2.3-dev"},{"binary_version":"2.3.1-2~ubuntu16.04.16+esm11","binary_name":"ruby2.3-tcltk"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/jruby@1.7.22-1ubuntu1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.7.21-2ubuntu4","1.7.22-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.7.22-1ubuntu1","binary_name":"jruby"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"ruby2.5","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/ruby2.5@2.5.1-1ubuntu1.16+esm5?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.5.1-1ubuntu1.16+esm5"}]}],"versions":["2.5.0~preview1-1ubuntu2","2.5.0-4ubuntu1","2.5.0-4ubuntu4","2.5.0-5ubuntu1","2.5.0-6ubuntu1","2.5.1-1ubuntu1","2.5.1-1ubuntu1.1","2.5.1-1ubuntu1.2","2.5.1-1ubuntu1.4","2.5.1-1ubuntu1.5","2.5.1-1ubuntu1.6","2.5.1-1ubuntu1.7","2.5.1-1ubuntu1.8","2.5.1-1ubuntu1.9","2.5.1-1ubuntu1.10","2.5.1-1ubuntu1.11","2.5.1-1ubuntu1.12","2.5.1-1ubuntu1.13","2.5.1-1ubuntu1.14","2.5.1-1ubuntu1.15","2.5.1-1ubuntu1.16","2.5.1-1ubuntu1.16+esm1","2.5.1-1ubuntu1.16+esm3","2.5.1-1ubuntu1.16+esm4"],"ecosystem_specific":{"binaries":[{"binary_version":"2.5.1-1ubuntu1.16+esm5","binary_name":"libruby2.5"},{"binary_version":"2.5.1-1ubuntu1.16+esm5","binary_name":"ruby2.5"},{"binary_version":"2.5.1-1ubuntu1.16+esm5","binary_name":"ruby2.5-dev"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/jruby@9.1.17.0-1~18.04?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.1.13.0-1","9.1.17.0-1~18.04"],"ecosystem_specific":{"binaries":[{"binary_version":"9.1.17.0-1~18.04","binary_name":"jruby"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"ruby2.7","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ruby2.7@2.7.0-5ubuntu1.16?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.0-5ubuntu1.16"}]}],"versions":["2.7.0-1","2.7.0-2","2.7.0-3","2.7.0-4","2.7.0-4ubuntu1","2.7.0-5ubuntu1","2.7.0-5ubuntu1.1","2.7.0-5ubuntu1.2","2.7.0-5ubuntu1.3","2.7.0-5ubuntu1.4","2.7.0-5ubuntu1.5","2.7.0-5ubuntu1.6","2.7.0-5ubuntu1.7","2.7.0-5ubuntu1.8","2.7.0-5ubuntu1.9","2.7.0-5ubuntu1.10","2.7.0-5ubuntu1.11","2.7.0-5ubuntu1.12","2.7.0-5ubuntu1.13","2.7.0-5ubuntu1.14","2.7.0-5ubuntu1.15"],"ecosystem_specific":{"binaries":[{"binary_version":"2.7.0-5ubuntu1.16","binary_name":"libruby2.7"},{"binary_version":"2.7.0-5ubuntu1.16","binary_name":"ruby2.7"},{"binary_version":"2.7.0-5ubuntu1.16","binary_name":"ruby2.7-dev"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/jruby@9.1.17.0-3build6?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.1.17.0-3","9.1.17.0-3build5","9.1.17.0-3build6"],"ecosystem_specific":{"binaries":[{"binary_version":"9.1.17.0-3build6","binary_name":"jruby"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"ruby3.0","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ruby3.0@3.0.2-7ubuntu2.10?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.2-7ubuntu2.10"}]}],"versions":["3.0.2-5ubuntu1","3.0.2-7","3.0.2-7ubuntu2","3.0.2-7ubuntu2.1","3.0.2-7ubuntu2.2","3.0.2-7ubuntu2.3","3.0.2-7ubuntu2.4","3.0.2-7ubuntu2.5","3.0.2-7ubuntu2.6","3.0.2-7ubuntu2.7","3.0.2-7ubuntu2.8"],"ecosystem_specific":{"binaries":[{"binary_version":"3.0.2-7ubuntu2.10","binary_name":"libruby3.0"},{"binary_version":"3.0.2-7ubuntu2.10","binary_name":"ruby3.0"},{"binary_version":"3.0.2-7ubuntu2.10","binary_name":"ruby3.0-dev"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/jruby@9.4.6.0+ds-1ubuntu3?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.3.9.0+ds-1","9.4.5.0+ds-1","9.4.5.0+ds-1ubuntu1","9.4.6.0+ds-1ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_version":"9.4.6.0+ds-1ubuntu3","binary_name":"jruby"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"ruby3.2","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/ruby3.2@3.2.3-1ubuntu0.24.04.5?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.3-1ubuntu0.24.04.5"}]}],"versions":["3.2.3-1","3.2.3-1build2","3.2.3-1build3","3.2.3-1ubuntu0.24.04.1","3.2.3-1ubuntu0.24.04.3"],"ecosystem_specific":{"binaries":[{"binary_version":"3.2.3-1ubuntu0.24.04.5","binary_name":"libruby3.2"},{"binary_version":"3.2.3-1ubuntu0.24.04.5","binary_name":"ruby3.2"},{"binary_version":"3.2.3-1ubuntu0.24.04.5","binary_name":"ruby3.2-dev"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/jruby@9.4.8.0+ds-3ubuntu1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.4.8.0+ds-2ubuntu1","9.4.8.0+ds-3ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"9.4.8.0+ds-3ubuntu1","binary_name":"jruby"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35176.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]}